Abstract
As increasingly many Internet-of-Things (IoT) devices collect personal data, users face more privacy decisions. Personal privacy assistants can provide social cues and help users make informed decisions by presenting information about how others have decided in similar cases. To better understand which social cues are relevant and whose recommendations users are more likely to follow, we presented 1000 online participants with nine IoT data-collection scenarios. Some participants were told the percentage of experts or friends who allowed data collection in each scenario, while other participants were provided no social cue. At the conclusion of each scenario, participants were asked whether they would allow the described data collection. Our results help explain under what circumstances users are more or less likely to be swayed by the reported behavior of others in similar scenarios. For example, our results indicate that when friends denied data collection, our participants were more influenced than when friends allowed data collection. On the other hand, participants were more influenced by experts when they allowed data collection. We also observed that influence could get stronger or wear off when participants were exposed to a sequence of scenarios. For example, when experts and friends repeatedly allowed data collection in scenarios with clear risk or denied it in scenarios with clear benefits, participants were less likely to be influenced by them in subsequent scenarios.
- Herman Aguinis and Kyle J Bradley. 2014. Best practice recommendations for designing and implementing experimental vignette methodology studies. Organizational Research Methods 17, 4 (2014), 351--371.Google ScholarCross Ref
- Vernon L Allen. 1965. Situational factors In conformity1. In Advances in experimental social psychology. Vol. 2. Elsevier, 133--175.Google Scholar
- Vernon L Allen and John M Levine. 1971. Social support and conformity: The role of independent assessment of reality. Journal of Experimental Social Psychology 7, 1 (1971), 48--58.Google ScholarCross Ref
- Solomon E Asch. 1956. Studies of independence and conformity: I. A minority of one against a unanimous majority. Psychological monographs: General and applied 70, 9 (1956), 1.Google Scholar
- Martina Balestra, Orit Shaer, Johanna Okerlund, Madeleine Ball, and Oded Nov. 2016. The Effect of Exposure to Social Annotation on Online Informed Consent Beliefs and Behavior. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW '16). ACM, New York, NY, USA, 900--912. Google ScholarDigital Library
- Jonathan Baron. 2000. Thinking and deciding. Cambridge University Press.Google Scholar
- Robert S Baron, Joseph A Vandello, and Bethany Brunsman. 1996. The forgotten variable in conformity research: Impact of task importance on social influence. Journal of personality and social psychology 71, 5 (1996), 915.Google ScholarCross Ref
- Christine Barter and Emma Renold. 1999. The use of vignettes in qualitative research. Social research update 25, 9 (1999), 1--6.Google Scholar
- Debjanee Barua, Judy Kay, and Cécile Paris. 2013. Viewing and controlling personal sensor data: what do users want?. In International Conference on Persuasive Technology. Springer, 15--26. Google ScholarDigital Library
- Michael Benisch, Patrick Gage Kelley, Norman Sadeh, and Lorrie Faith Cranor. 2011. Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs. Personal and Ubiquitous Computing 15, 7 (2011), 679--694. Google ScholarDigital Library
- Andrew Besmer, Jason Watson, and Heather Richter Lipford. 2010. The Impact of Social Navigation on Privacy Policy Configuration. In Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS '10). ACM, New York, NY, USA, Article 7, 10 pages. Google ScholarDigital Library
- Sushil Bikhchandani, David Hirshleifer, and Ivo Welch. 1992. A theory of fads, fashion, custom, and cultural change as informational cascades. Journal of political Economy 100, 5 (1992), 992--1026.Google ScholarCross Ref
- Michael Buhrmester, Tracy Kwang, and Samuel D Gosling. 2011. Amazon's Mechanical Turk: A new source of inexpensive, yet high-quality, data? Perspectives on psychological science 6, 1 (2011), 3--5.Google Scholar
- Ronald S Burt. 2017. Structural holes versus network closure as social capital. In Social capital. Routledge, 31--56.Google Scholar
- Scott Camazine. 2003. Self-organization in biological systems. Princeton University Press. Google ScholarDigital Library
- Richard Chow. 2017. The Last Mile for IoT Privacy. IEEE Security & Privacy 15, 6 (2017), 73--76.Google ScholarDigital Library
- Robert B Cialdini and Noah J Goldstein. 2004. Social influence: Compliance and conformity. Annu. Rev. Psychol. 55 (2004), 591--621.Google ScholarCross Ref
- Robert T Clemen and Robert L Winkler. 1986. Combining economic forecasts. Journal of Business & Economic Statistics 4, 1 (1986), 39--46.Google Scholar
- Janet Fagan Coleman, Robert R Blake, and Jane Srygley Mouton. 1958. Task difficulty and conformity pressures. The Journal of Abnormal and Social Psychology 57, 1 (1958), 120.Google ScholarCross Ref
- Iain D Couzin, Christos C Ioannou, Güven Demirel, Thilo Gross, Colin J Torney, Andrew Hartnett, Larissa Conradt, Simon A Levin, and Naomi E Leonard. 2011. Uninformed individuals promote democratic consensus in animal groups. science 334, 6062 (2011), 1578--1580.Google Scholar
- Matthew A Cronin and Laurie R Weingart. 2007. Representational gaps, information processing, and conflict in functionally diverse teams. Academy of Management Review 32, 3 (2007), 761--773.Google ScholarCross Ref
- Anupam Das, Martin Degeling, Daniel Smullen, and Norman Sadeh. 2018. Personalized Privacy Assistants for the Internet of Things. (2018).Google Scholar
- Sauvik Das, Adam D.I. Kramer, Laura A. Dabbish, and Jason I. Hong. 2015. The Role of Social Influence in Security Feature Adoption. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15). ACM, New York, NY, USA, 1416--1426. Google ScholarDigital Library
- Thomas H Davenport. 2013. Analytics in Healthcare and the Life Sciences: Strategies, Implementation Methods, and Best Practices. Pearson Education.Google Scholar
- Morton Deutsch and Harold B Gerard. 1955. A study of normative and informational social influences upon individual judgment. The journal of abnormal and social psychology 51, 3 (1955), 629.Google Scholar
- Paul DiGioia and Paul Dourish. 2005. Social navigation as a model for usable security. In Proceedings of the 2005 symposium on Usable privacy and security. ACM, 101--108. Google ScholarDigital Library
- Nora A. Draper. 2017. From Privacy Pragmatist to Privacy Resigned: Challenging Narratives of Rational Choice in Digital Privacy Debates: Challenging Rational Choice in Digital Privacy Debates. Policy & Internet 9, 2 (June 2017), 232--251.Google ScholarCross Ref
- Janna Lynn Dupree, Richard Devries, Daniel M. Berry, and Edward Lank. 2016. Privacy Personas: Clustering Users via Attitudes and Behaviors Toward Security Practices. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 5228--5239. Google ScholarDigital Library
- Pardis Emami-Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Cranor, and Norman Sadeh. 2017. Privacy expectations and preferences in an IoT world. In SOUPS '17: Proceedings of the 13th Symposium on Usable Privacy and Security. Google ScholarDigital Library
- Leon Festinger. 1954. A theory of social comparison processes. Human relations 7, 2 (1954), 117--140.Google Scholar
- David Gefen, Izak Benbasat, and Paula Pavlou. 2008. A research agenda for trust in online environments. Journal of Management Information Systems 24, 4 (2008), 275--286. Google ScholarDigital Library
- Francesca Gino and Don A Moore. 2007. Effects of task difficulty on use of advice. Journal of Behavioral Decision Making 20, 1 (2007), 21--35.Google ScholarCross Ref
- Jeremy Goecks, W Keith Edwards, and Elizabeth D Mynatt. 2009. Challenges in supporting end-user privacy and security management with social navigation. In Proceedings of the 5th Symposium on Usable Privacy and Security. ACM, 5. Google ScholarDigital Library
- Jeremy Goecks and Elizabeth D Mynatt. 2005. Supporting privacy management via community experience and expertise. In Communities and Technologies 2005. Springer, 397--417.Google Scholar
- Joseph K Goodman, Cynthia E Cryder, and Amar Cheema. 2013. Data collection in a flat world: The strengths and weaknesses of Mechanical Turk samples. Journal of Behavioral Decision Making 26, 3 (2013), 213--224.Google ScholarCross Ref
- Nigel Harvey and Ilan Fischer. 1997. Taking advice: Accepting help, improving judgment, and sharing responsibility. Organizational Behavior and Human Decision Processes 70, 2 (1997), 117--133.Google ScholarCross Ref
- Chip Heath, Richard P Larrick, and Joshua Klayman. 1998. Cognitive repairs: How organizational practices can compensate for individual shortcomings. In Review of Organizational Behavior. Citeseer.Google Scholar
- Paul Hewson. 2016. Statistical Rethinking: a Bayesian Course with Examples in R and Stan R. McElreath, 2015 Boca Raton Chapman and Hall--CRC 470 pp.,£ 60.99 ISBN 978--1--482--25344--3. Journal of the Royal Statistical Society: Series A (Statistics in Society) 179, 4 (2016), 1131--1132.Google ScholarCross Ref
- Bert H Hodges, Benjamin R Meagher, Daniel J Norton, Ryan McBain, and Ariane Sroubek. 2014. Speaking from ignorance: Not agreeing with others we believe are correct. Journal of Personality and Social Psychology 106, 2 (2014), 218.Google ScholarCross Ref
- David W Hosmer Jr, Stanley Lemeshow, and Rodney X Sturdivant. 2013. Applied logistic regression. Vol. 398. John Wiley & Sons.Google Scholar
- Arthur Jenness. 1932. The role of discussion in changing opinion regarding a matter of fact. The Journal of Abnormal and Social Psychology 27, 3 (1932), 279.Google ScholarCross Ref
- Helmut Jungermann and Katrin Fischer. 2005. Using expertise and experience for giving and taking advice. The routines of decision making (2005), 157--173.Google Scholar
- Joseph B Kadane and Nicole A Lazar. 2004. Methods and Criteria for Model Selection. J. Amer. Statist. Assoc. 99, 465 (2004), 279--290. arXiv:https://doi.org/10.1198/016214504000000269Google ScholarCross Ref
- Ruogu Kang, Stephanie Brown, Laura Dabbish, and Sara Kiesler. 2014. Privacy attitudes of mechanical turk workers and the us public. In Symposium on Usable Privacy and Security (SOUPS), Vol. 4. 1. Google ScholarDigital Library
- Herbert C Kelman. 1958. Compliance, identification, and internalization three processes of attitude change. Journal of conflict resolution 2, 1 (1958), 51--60.Google ScholarCross Ref
- Predrag Klasnja, Sunny Consolvo, Tanzeem Choudhury, Richard Beckwith, and Jeffrey Hightower. 2009. Exploring privacy concerns about personal sensing. In International Conference on Pervasive Computing. Springer, 176--183. Google ScholarDigital Library
- B. P. Knijnenburg. 2017. Privacy? I Can't Even! Making a Case for User-Tailored Privacy. IEEE Security & Privacy 15, 4 (2017), 62--67.Google ScholarDigital Library
- Joseph A. Konstan and John Riedl. 2003. Designing Information Spaces. Springer-Verlag, London, UK, UK, Chapter Collaborative Filtering: Supporting Social Navigation in Large, Crowded Infospaces, 43--82. http://dl.acm.org/citation. cfm?id=937956.937959 Google ScholarDigital Library
- Ponnurangam Kumaraguru and Lorrie Cranor. 2005. Privacy indexes : a survey of Westin's studies. Institute for Software Research (Jan. 2005). http://repository.cmu.edu/isr/856Google Scholar
- J. Richard Landis and Gary G. Koch. 1977. The Measurement of Observer Agreement for Categorical Data. Biometrics 33, 1 (March 1977), 159.Google Scholar
- Marc Langheinrich. 2002. A Privacy Awareness System for Ubiquitous Computing Environments. In Proceedings of the 4th International Conference on Ubiquitous Computing (UbiComp '02). Springer-Verlag, London, UK, UK, 237--245. http://dl.acm.org/citation.cfm?id=647988.741491 Google ScholarDigital Library
- Richard P Larrick and Jack B Soll. 2006. Intuitions about combining opinions: Misappreciation of the averaging principle. Management science 52, 1 (2006), 111--127. Google ScholarDigital Library
- Bibb Latané. 1981. The psychology of social impact. American psychologist 36, 4 (1981), 343.Google Scholar
- Scott Lederer, Jennifer Mankoff, and Anind K Dey. 2003. Who wants to know what when? privacy preference determinants in ubiquitous computing. In CHI'03 extended abstracts on Human factors in computing systems. ACM, 724--725. Google ScholarDigital Library
- Hosub Lee and Alfred Kobsa. 2016. Understanding user privacy in Internet of Things environments. In Internet of Things (WF-IoT), 2016 IEEE 3rd World Forum on. IEEE, 407--412.Google ScholarCross Ref
- Hosub Lee and Alfred Kobsa. 2017. Privacy preference modeling and prediction in a simulated campuswide IoT environment. In 2017 IEEE International Conference on Pervasive Computing and Communications, PerCom 2017, Hawaii, USA, March 13--17, 2017. 276--285.Google ScholarCross Ref
- Hosub Lee and Alfred Kobsa. 2017. Privacy preference modeling and prediction in a simulated campuswide IoT environment. In Pervasive Computing and Communications (PerCom), 2017 IEEE International Conference on. IEEE, 276--285.Google ScholarCross Ref
- Linda Lee, JoongHwa Lee, Serge Egelman, and David Wagner. {n. d.}. Information Disclosure Concerns in The Age of Wearable Computing. In Proceedings of the NDSS Workshop on Usable Security, USEC 2016, Internet Society. February 10, 2016.Google ScholarCross Ref
- Jialiu Lin, Shahriyar Amini, Jason I Hong, Norman Sadeh, Janne Lindqvist, and Joy Zhang. 2012. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing. ACM, 501--510. Google ScholarDigital Library
- Bin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Zhang, Norman M. Sadeh, Yuvraj Agarwal, and Alessandro Acquisti. 2016. Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. In Twelfth Symposium on Usable Privacy and Security, SOUPS 2016, Denver, CO, USA, June 22--24, 2016. 27--41. https://www.usenix.org/conference/soups2016/technical-sessions/presentation/liu Google ScholarDigital Library
- Steson Lo and Sally Andrews. 2015. To transform or not to transform: Using generalized linear mixed models to analyse reaction time data. Frontiers in Psychology 6 (2015), 1171.Google ScholarCross Ref
- Jan Lorenz, Heiko Rauhut, Frank Schweitzer, and Dirk Helbing. 2011. How social influence can undermine the wisdom of crowd effect. Proceedings of the National Academy of Sciences 108, 22 (2011), 9020--9025.Google ScholarCross Ref
- Todd Lucas, Sheldon Alexander, Ira J Firestone, and Boris B Baltes. 2006. Self-efficacy and independence from social influence: Discovery of an efficacy--difficulty effect. Social Influence 1, 1 (2006), 58--80.Google ScholarCross Ref
- Diane M Mackie. 1987. Systematic and nonsystematic processing of majority and minority persuasive communications. Journal of Personality and Social Psychology 53, 1 (1987), 41.Google ScholarCross Ref
- Kathleen M. MacQueen, Eleanor McLellan, Kelly Kay, and Bobby Milstein. 1998. Codebook Development for TeamBased Qualitative Analysis. CAM Journal 10, 2 (May 1998), 31--36.Google ScholarCross Ref
- Albert E Mannes. 2009. Are we wise about the wisdom of crowds? The use of group judgments in belief revision. Management Science 55, 8 (2009), 1267--1279. Google ScholarDigital Library
- Robin Martin, Antonis Gardikiotis, and Miles Hewstone. 2002. Levels of consensus and majority and minority influence. European Journal of Social Psychology 32, 5 (2002), 645--665.Google ScholarCross Ref
- Pavlin Mavrodiev, Claudio J Tessone, and Frank Schweitzer. 2012. Effects of social influence on the wisdom of crowds. arXiv preprint arXiv:1204.3463 (2012).Google Scholar
- Pavlin Mavrodiev, Claudio J Tessone, and Frank Schweitzer. 2013. Quantifying the effects of social influence. Scientific reports 3 (2013), 1360.Google Scholar
- Alex Mayle, Neda Hajiakhoond Bidoki, Sina Masnadi, Ladislau Boeloeni, and Damla Turgut. 2017. Investigating the Value of Privacy within the Internet of Things. In GLOBECOM 2017--2017 IEEE Global Communications Conference. IEEE, 1--6.Google Scholar
- Tamir Mendel and Eran Toch. 2017. Susceptibility to Social Influence of Privacy Behaviors: Peer Versus Authoritative Sources. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). ACM, New York, NY, USA, 581--593. Google ScholarDigital Library
- Dar Meshi, Guido Biele, Christoph W Korn, and Hauke R Heekeren. 2012. How expert advice influences decision making. PLoS One 7, 11 (2012), e49748.Google ScholarCross Ref
- A. Morton and M. A. Sasse. 2014. Desperately seeking assurances: Segmenting users by their information-seeking preferences. In 2014 Twelfth Annual International Conference on Privacy, Security and Trust. 102--111.Google Scholar
- Mehdi Moussaid, Simon Garnier, Guy Theraulaz, and Dirk Helbing. 2009. Collective information processing and pattern formation in swarms, flocks, and crowds. Topics in Cognitive Science 1, 3 (2009), 469--497.Google ScholarCross Ref
- Raymond S Nickerson. 1998. Confirmation bias: A ubiquitous phenomenon in many guises. Review of general psychology 2, 2 (1998), 175.Google Scholar
- Helen Nissenbaum. 2004. Privacy as Contextual Integrity. Washington Law Review 79 (2004), 119. http://nyu.edu/ projects/nissenbaum/papers/washingtonlawreview.pdfGoogle Scholar
- Gabriele Paolacci, Jesse Chandler, and Panagiotis G Ipeirotis. 2010. Running experiments on amazon mechanical turk. (2010).Google Scholar
- Sameer Patil, Xinru Page, and Alfred Kobsa. 2011. With a little help from my friends: can social navigation inform interpersonal privacy preferences?. In Proceedings of the 2011 ACM Conference on Computer Supported Cooperative Work, CSCW 2011, Hangzhou, China, March 19--23, 2011. 391--394. Google ScholarDigital Library
- Paul Resnick, Ko Kuwabara, Richard Zeckhauser, and Eric Friedman. 2000. Reputation Systems. Commun. ACM 43, 12 (Dec. 2000), 45--48. Google ScholarDigital Library
- Joel Ross, Andrew Zaldivar, Lilly Irani, and Bill Tomlinson. 2009. Who are the Turkers? Worker Demographics in Amazon Mechanical Turk. (01 2009).Google Scholar
- Muzafer Sherif. 1935. A study of some social factors in perception. Archives of Psychology (Columbia University) (1935).Google Scholar
- Jack B Soll and Albert E Mannes. 2011. Judgmental aggregation strategies depend on whether the self is involved. International Journal of Forecasting 27, 1 (2011), 81--102.Google ScholarCross Ref
- Erin L Spottswood and Jeffrey T Hancock. 2017. Should I share that? Prompting social norms that influence privacy behaviors on a social networking site. Journal of Computer-Mediated Communication 22, 2 (2017), 55--70. Google ScholarDigital Library
- James Surowiecki. 2005. The wisdom of crowds. Anchor. Google ScholarDigital Library
- Ulf Toelch, Marjolijn J van Delft, Matthew J Bruce, Rogier Donders, Marius TH Meeus, and Simon M Reader. 2009. Decreased environmental variability induces a bias for social information use in humans. Evolution and Human Behavior 30, 1 (2009), 32--40.Google ScholarCross Ref
- Ilaria Torre, Odnan Ref Sanchez, Frosina Koceva, and Giovanni Adorni. 2018. Supporting users to take informed decisions on privacy settings of personal devices. Personal and Ubiquitous Computing 22, 2 (2018), 345--364. Google ScholarDigital Library
- Trisha Van Zandt and Roger Ratcliff. 1995. Statistical mimicking of reaction time data: Single-process models, parameter variability, and mixtures. Psychonomic Bulletin & Review 2, 1 (1995), 20--54.Google ScholarCross Ref
- Ilan Yaniv and Eli Kleinberger. 2000. Advice taking in decision making: Egocentric discounting and reputation formation. Organizational behavior and human decision processes 83, 2 (2000), 260--281.Google Scholar
- Tao Zhou. 2011. An empirical examination of initial trust in mobile banking. Internet Research 21, 5 (2011), 527--540.Google ScholarCross Ref
- Jan Henrik Ziegeldorf, Oscar Garcia Morchon, and Klaus Wehrle. 2014. Privacy in the Internet of Things: threats and challenges. Security and Communication Networks 7, 12 (2014), 2728--2742.Google ScholarCross Ref
Index Terms
- The Influence of Friends and Experts on Privacy Decision Making in IoT Scenarios
Recommendations
Exploring How Privacy and Security Factor into IoT Device Purchase Behavior
CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing SystemsDespite growing concerns about security and privacy of Internet of Things (IoT) devices, consumers generally do not have access to security and privacy information when purchasing these devices. We interviewed 24 participants about IoT devices they ...
Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home
EuroUSEC '22: Proceedings of the 2022 European Symposium on Usable SecurityStudies of privacy perception in the Internet of Things (IoT) include in-laboratory evaluations as well as investigations of purchase decisions, deployment, and long-term use. In this study, we implemented identical IoT configurations in eight ...
To Self-Persuade or be Persuaded: Examining Interventions for Users’ Privacy Setting Selection
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsUser adoption of security and privacy (S&P) best practices remains low, despite sustained efforts by researchers and practitioners. Social influence is a proven method for guiding user S&P behavior, though most work has focused on studying peer ...
Comments